|
|
This chapter describes how to configure Ethernet, Token Ring, and private VLANs on the Catalyst 6000 family switches.
![]() |
Note For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst 6000 Family Command Reference publication. |
![]() |
Note The Catalyst 6000 family switch 10/100 Ethernet switching modules support auxiliary VLANs. You can plug an externally powered IP phone into a 10/100 port and then add that port to an auxiliary VLAN using the set port auxiliaryvlan command. For complete details on configuring auxiliary VLANs, see "Configuring a Voice-over-IP Network." |
This chapter consists of these sections:
A VLAN is a group of end stations with a common set of requirements, independent of physical location. VLANs have the same attributes as a physical LAN but allow you to group end stations even if they are not located physically on the same LAN segment.
These sections describe how VLANs work:
VLANs allow you to group ports on a switch to limit unicast, multicast, and broadcast traffic flooding. Flooded traffic originating from a particular VLAN is only flooded out other ports belonging to that VLAN.
![]() |
Note Before you create VLANs, you must decide whether to use VTP to maintain global VLAN configuration information for your network. For complete information on VTP, see "Configuring VTP." |
Figure 9-1 shows an example of VLANs segmented into logically defined networks.

You can set these parameters when you create a VLAN in the management domain:
![]() |
Note When translating from one VLAN type to another, the switch software requires a different VLAN number for each media type. |
Two Token Ring VLAN types are supported on switches running VTP version 2:
![]() |
Note Catalyst 6000 family switches do not support ISL-encapsulated Token Ring frames. |
Token Ring Bridge Relay Function (TrBRF) VLANs interconnect multiple Token Ring Concentrator Relay Function (TrCRF) VLANs in a switched Token Ring network (see Figure 9-2). The TrBRF can be extended across a network of switches interconnected via trunk links. The connection between the TrCRF and the TrBRF is referred to as a logical port.

For source routing, the switch appears as a single bridge between the logical rings. The TrBRF can function as a source-route bridge (SRB) or source-route transparent (SRT) bridge running either the IBM or IEEE STP. If SRB is used, you can define duplicate MAC addresses on different logical rings.
The Token Ring software runs an instance of STP for each TrBRF VLAN and each TrCRF VLAN. For TrCRF VLANs, STP removes loops in the logical ring. For TrBRF VLANs, STP interacts with external bridges to remove loops from the bridge topology, similar to STP operation on Ethernet VLANs.
![]() |
Caution Certain parent TrBRF STP and TrCRF bridge mode configurations can place the logical ports (the connection between the TrBRF and the TrCRF) of the TrBRF in a blocked state. For more information, see the "VLAN Configuration Guidelines" section. |
For source routing, the switch appears as a single bridge between the logical rings. The TrBRF can function as an SRB or SRT bridge running either the IBM or IEEE STP. If SRB is used, duplicate MAC addresses can be defined on different logical rings.
To accommodate IBM System Network Architecture (SNA) traffic, you can use a combination of SRT and SRB modes. In a mixed mode, the TrBRF considers some ports (logical ports connected to TrCRFs) to operate in SRB mode while others operate in SRT mode.
Token Ring Concentrator Relay Function (TrCRF) VLANs define port groups with the same logical ring number. You can configure two types of TrCRFs in your network: undistributed and backup.
Typically, TrCRFs are undistributed, which means each TrCRF is limited to the ports on a single switch. Multiple undistributed TrCRFs on the same or separate switches can be associated with a single parent TrBRF (see Figure 9-3). The parent TrBRF acts as a multiport bridge, forwarding traffic between the undistributed TrCRFs.
![]() |
Note To pass data between rings located on separate switches, you can associate the rings to the same TrBRF and configure the TrBRF for SRB. |

![]() |
Note By default, Token Ring ports are associated with the default TrCRF (VLAN 1003, trcrf-default), which has the default TrBRF (VLAN 1005, trbrf-default) as its parent. In this configuration, a distributed TrCRF is possible (see Figure 9-4), and traffic is passed between the default TrCRFs located on separate switches provided that the switches are connected through an ISL trunk. |

Within a TrCRF, source-route switching forwards frames based on either MAC addresses or route descriptors. The entire VLAN can operate as a single ring, with frames switched between ports within a single TrCRF.
You can specify the maximum hop count for All-Routes and Spanning-Tree Explorer frames for each TrCRF. This limits the maximum number of hops an explorer is allowed to traverse. If a port determines that the explorer frame it is receiving has traversed more than the number of hops specified, it does not forward the frame. The TrCRF determines the number of hops an explorer has traversed based on the number of bridge hops in the route information field.
A backup TrCRF enables you to configure an alternate route for traffic between undistributed TrCRFs located on separate switches that are connected by a TrBRF, in the event that the ISL connection between the switches fails. Only one backup TrCRF for a TrBRF is allowed, and only one port per switch can belong to a backup TrCRF.
If the ISL connection between the switches fails, the port in the backup TrCRF on each affected switch automatically becomes active, rerouting traffic between the undistributed TrCRFs through the backup TrCRF. When the ISL connection is reestablished, all but one port in the backup TrCRF is disabled. Figure 9-5 illustrates the backup TrCRF.
Table 9-1 shows the default VLAN configuration.
| Feature | Default Value |
|---|---|
Native (default) VLAN | VLAN 1 |
Port VLAN assignments | All ports assigned to VLAN 1 Token Ring ports assigned to VLAN 1003 (trcrf-default) |
VLAN state | Enabled |
MTU size | 1500 bytes 4472 bytes for Token Ring VLANs |
SAID value | 100,000 plus the VLAN number (for example, the SAID for VLAN 3 is 100003) |
Pruning eligibility | VLANs 2-1000 are pruning eligible |
Default FDDI VLAN | VLAN 1002 |
Default FDDI NET VLAN | VLAN 1004 |
Default Token Ring TrBRF VLAN | VLAN 1005 (trbrf-default) with bridge number 0F |
Default Token Ring TrCRF VLAN | VLAN 1003 (trcrf-default) |
TrBRF STP | IBM |
TrCRF bridge mode | SRB |
Follow these guidelines when creating and modifying VLANs in your network:
![]() |
Note VLANs support a number of parameters that are not discussed in detail in this section. For complete information on the set vlan command and its parameters, refer to the Catalyst 6000 Family Command Reference publication. |
These sections describe how to configure VLANs:
To create a new Ethernet VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Create a new Ethernet VLAN. | set vlan vlan_num [name name] [said said] [mtu mtu] [translation vlan_num] |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
![]() |
Note The default VLAN type is Ethernet; if you do not specify the VLAN type, the VLAN is an Ethernet VLAN. |
This example shows how to create an Ethernet VLAN and verify the configuration:
Console> (enable) set vlan 500 name Engineering Vlan 500 configuration successful Console> (enable) show vlan 500 VLAN Name Status IfIndex Mod/Ports, Vlans ---- -------------------------------- --------- ------- ------------------------ 500 Engineering active 344 VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------ 500 enet 100500 1500 - - - - - 0 0 VLAN AREHops STEHops Backup CRF ---- ------- ------- ---------- Console> (enable)
To modify the VLAN parameters on an existing Ethernet VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Modify an existing Ethernet VLAN. | set vlan vlan_num [name name] [state {active | suspend}] [said said] [mtu mtu] [translation vlan_num] |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
To create a new FDDI VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Create a new FDDI or FDDI NET-type VLAN. | set vlan vlan_num [name name] type {fddi | fddinet} [said said] [mtu mtu] |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
To modify the VLAN parameters on an existing FDDI VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Modify an existing FDDI or FDDI NET-type VLAN. | set vlan vlan_num [name name] [state {active | suspend}] [said said] [mtu mtu] |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
![]() |
Note You must enable VTP version 2 before you create Token Ring VLANs. For information on enabling VTP version 2, see "Configuring VTP." |
To create a new Token Ring TrBRF VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Create a new Token Ring TrBRF-type VLAN. | set vlan vlan_num [name name] type trbrf [said said] [mtu mtu] bridge bridge_number [stp |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
![]() |
Note You must specify a bridge number when creating a new TrBRF. |
This example shows how to create a new Token Ring TrBRF VLAN and verify the configuration:
Console> (enable) set vlan 999 name TrBRF_999 type trbrf bridge a Vlan 999 configuration successful Console> (enable) show vlan 999 VLAN Name Status IfIndex Mod/Ports, Vlans ---- -------------------------------- --------- ------- ------------------------ 999 TrBRF_999 active VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------ 999 trbrf 100999 4472 - - 0xa ibm - 0 0 VLAN AREHops STEHops Backup CRF ---- ------- ------- ---------- Console> (enable)
To modify the VLAN parameters on an existing Token Ring TrBRF VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Modify an existing Token Ring TrBRF-type VLAN. | set vlan vlan_num [name name] [state {active | suspend}] [said said] [mtu mtu] [bridge bridge_number] [stp {ieee | ibm}] |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
![]() |
Note You must enable VTP version 2 before you create Token Ring VLANs. For information on enabling VTP version 2, see "Configuring VTP." |
To create a new Token Ring TrCRF VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Create a new Token Ring TrCRF-type VLAN. | set vlan vlan_num [name name] type trcrf [said said] [mtu mtu] {ring hex_ring_number | decring decimal_ring_number} parent vlan_num |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
![]() |
Note You must specify a ring number (either in hexadecimal or in decimal) and a parent TrBRF VLAN when creating a new TrCRF. |
This example shows how to create a Token Ring TrCRF VLAN and verify the configuration:
Console> (enable) set vlan 998 name TrCRF_998 type trcrf decring 10 parent 999 Vlan 998 configuration successful Console> (enable) show vlan 998 VLAN Name Status IfIndex Mod/Ports, Vlans ---- -------------------------------- --------- ------- ------------------------ 998 TrCRF_998 active 352 VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------ 998 trcrf 100998 4472 999 0xa - - srb 0 0 VLAN AREHops STEHops Backup CRF ---- ------- ------- ---------- 998 7 7 off Console> (enable)
To modify the VLAN parameters on an existing Token Ring TrCRF VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Modify an existing Token Ring TrCRF-type VLAN. | set vlan vlan_num [name name] [state {active | suspend}] [said said] [mtu mtu] [ring hex_ring_num] [decring decimal_ring_num] [bridge bridge_num] [parent vlan_num] |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
To configure a TrCRF VLAN as a backup TrCRF, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Configure a TrCRF VLAN as a backup TrCRF. | set vlan vlan_num backupcrf on |
Step 2 | Verify the VLAN configuration. | show vlan [vlan_num] |
![]() |
Caution If the backup TrCRF port is attached to a Token Ring multistation access unit (MSAU), it does not provide a backup path unless the ring speed and port mode are set by another device. We recommend that you configure the ring speed and port mode for the backup TrCRF. |
| Task | Command | |
|---|---|---|
Step 1 | Specify the maximum number of hops for All-Routes Explorer frames in the TrCRF. | set vlan vlan_num aremaxhop hopcount |
Step 2 | Specify the maximum number of hops for Spanning-Tree Explorer frames in the TrCRF. | set vlan vlan_num stemaxhop hopcount |
Step 3 | Verify the VLAN configuration. | show vlan [vlan_num] |
This example shows how to limit All-Routes Explorer frames and Spanning-Tree Explorer frames to ten hops and how to verify the configuration:
Console> (enable) set vlan 998 aremaxhop 10 stemaxhop 10 Vlan 998 configuration successful Console> (enable) show vlan 998 VLAN Name Status IfIndex Mod/Ports, Vlans ---- -------------------------------- --------- ------- ------------------------ 998 VLAN0998 active 357 VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------ 998 trcrf 100998 4472 999 0xff - - srb 0 0 VLAN AREHops STEHops Backup CRF ---- ------- ------- ---------- 998 10 10 off Console> (enable)
A VLAN created in a management domain remains unused until you assign one or more switch ports to the VLAN. If you specify a VLAN that does not exist, the VLAN is created and the specified ports are assigned to it.
![]() |
Note Make sure you assign switch ports to a VLAN of the proper type. Assign Ethernet, Fast Ethernet, and Gigabit Ethernet ports to Ethernet-type VLANs. |
To assign one or more switch ports to a VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Assign one or more switch ports to a VLAN. | set vlan vlan_num mod_num/port_num |
Step 2 | Verify the port VLAN membership. | show vlan [vlan_num] |
This example shows how to assign switch ports to a VLAN and verify the assignment:
Console> (enable) set vlan 560 4/10
VLAN 560 modified.
VLAN 1 modified.
VLAN Mod/Ports
---- -----------------------
560 4/10
Console> (enable) show vlan 560
VLAN Name Status IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
560 Engineering active 348 4/10
VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
560 enet 100560 1500 - - - - - 0 0
VLAN AREHops STEHops Backup CRF
---- ------- ------- ----------
Console> (enable) show port 4/10
Port Name Status Vlan Level Duplex Speed Type
----- ------------------ ---------- ---------- ------ ------ ----- ------------
4/10 notconnect 560 normal half 10 10BaseT
<...output truncated...>
Last-Time-Cleared
--------------------------
Wed Jun 24 1998, 12:16:41
Console> (enable)
The valid range of user-configured Inter-Switch Link (ISL) VLANs is 1-1000. The valid range of VLANs specified in the IEEE 802.1Q standard is 0-4095. In a network environment with non-Cisco devices connected to Cisco switches through 802.1Q trunks, you must map 802.1Q VLAN numbers greater than 1000 to ISL VLAN numbers.
802.1Q VLANs in the range 1-1000 are automatically mapped to the corresponding ISL VLAN. 802.1Q VLAN numbers greater than 1000 must be mapped to an ISL VLAN in order to be recognized and forwarded by Cisco switches.
These restrictions apply when mapping 802.1Q VLANs to ISL VLANs:
To map an 802.1Q VLAN to an ISL VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Map an 802.1Q VLAN to an ISL Ethernet VLAN. The valid range for dot1q_vlan is 1001-4095. The valid range for isl_vlan is 1-1000. | set vlan mapping dot1q dot1q_vlan isl isl_vlan |
Step 2 | Verify the VLAN mapping. | show vlan mapping |
This example shows how to map 802.1Q VLANs 2000, 3000, and 4000 to ISL VLANs 200, 300, and 400 and how to verify the configuration:
Console> (enable) set vlan mapping dot1q 2000 isl 200 802.1q vlan 2000 is existent in the mapping table Console> (enable) set vlan mapping dot1q 3000 isl 300 Vlan mapping successful Console> (enable) set vlan mapping dot1q 4000 isl 400 Vlan mapping successful Console> (enable) show vlan mapping 802.1q vlan ISL vlan Effective ------------------------------------------ 2000 200 true 3000 300 true 4000 400 true Console> (enable)
To clear an 802.1Q-to-ISL VLAN mapping, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Clear an 802.1Q-to-ISL VLAN mapping. | clear vlan mapping dot1q {dot1q_vlan | all} |
Step 2 | Verify the VLAN mapping. | show vlan mapping |
This example shows how to clear the VLAN mapping for 802.1Q VLAN 2000:
Console> (enable) clear vlan mapping dot1q 2000 Vlan 2000 mapping entry deleted Console> (enable)
This example shows how to clear all 802.1Q-to-ISL VLAN mappings:
Console> (enable) clear vlan mapping dot1q all All vlan mapping entries deleted Console> (enable)
When you delete a VLAN in VTP server mode, the VLAN is removed from all switches in the VTP domain. When you delete a VLAN in VTP transparent mode, the VLAN is deleted only on the current switch.
![]() |
Caution When you delete a VLAN, any ports assigned to that VLAN become inactive. Such ports remain associated with the VLAN (and thus inactive) until you assign them to a new VLAN. |
To delete a VLAN on the switch, perform this task in privileged mode:
Task | Command |
|---|---|
|
|
![]() |
Note You cannot delete a Token Ring TrBRF VLAN without first reassigning its child TrCRFs to another parent TrBRF, or deleting the child TrCRFs. |
This example shows how to delete a VLAN (in this case, the switch is a VTP server):
Console> (enable) clear vlan 500 This command will deactivate all ports on vlan 500 in the entire management domain Do you want to continue(y/n) [n]?y Vlan 500 deleted Console> (enable)
These sections describe how private VLANs work:
To configure private VLANs you need supervisor engine software release 5.4(1) or later and MSFC IOS software release 12.0(7)XE1 or later.
A private VLAN is a set of ports that you configure to have the features of normal VLANs in addition to providing some Layer 2 isolation from other ports on the Catalyst 6000 family switch. Ports belonging to a private VLAN are associated with a common set of supporting VLANs that are used to create the private VLAN structure. Private VLANs and normal VLANs can be configured from the same Catalyst 6000 family switch.
There are three types of private VLAN ports: promiscuous, isolated, and community.
A private VLAN comprises pairs of VLANs that share a primary VLAN. Within a private VLAN, there are three distinct classifications of VLANs: a single primary VLAN, a single isolated VLAN, and a series of community VLANs.
You must define each supporting VLAN within a private VLAN structure before you can configure the private VLAN:
To create a private VLAN, you assign two or more normal VLANs in the normal VLAN range: one VLAN is designated as a primary VLAN, a second VLAN is designated as an isolated VLAN, and potentially, additional VLANs are designated as community VLANs. After designating the VLANs, you must bind them together and associate them to the promiscuous port.
Private VLANs can be extended across multiple Ethernet switches by trunking the primary, isolated, and any community VLANs to other switches that support private VLANs.
In an Ethernet-switched environment where it is desirable to have Layer 2 isolation between individual or groups of stations, you can assign an individual VLAN and associated IP subnet to each individual or common group of stations. In many environments, the servers only require the ability to communicate with a default gateway to gain access to end points outside the VLAN itself. By incorporating these stations, regardless of ownership, into one private VLAN, you achieve these benefits:
On a Multilayer Switch Feature Card (MSFC) port or a nontrunk promiscuous port, you can remap as many community VLANs as desired; however, while a nontrunk promiscuous port can remap to only one primary VLAN, an MSFC port does not have this limitation. Another difference between the two types of promiscuous ports, is that an MSFC port can only connect an MSFC router, while with a nontrunk promiscuous port you can connect a wide range of devices as "access points" to a private VLAN. For example, you can connect a nontrunk promiscuous port to the "server port" of a LocalDirector to remap a number of community VLANs to the server VLAN so that the LocalDirector can load balance the servers present in the communities, or you can use a nontrunk promiscuous port to monitor and/or back up all the private VLAN servers from an administration workstation.
This section contains configuration guidelines for private VLANs:
| Module Number | Description | Ports by ASIC |
|---|---|---|
WS-X6224-100FX-MT | 24-port 100FX Multimode MT-RJ | Ports 1-12 Ports 13-24 Ports 25-36 Ports 37-48 |
WS-X6248-RJ-45 | 48-port 10/100TX RJ-45 | Ports 1-12 Ports 13-24 Ports 25-36 Ports 37-48 |
WS-X6248-TEL | 48-Port 10/100TX RJ-21 | Ports 1-12 Ports 13-24 Ports 25-36 Ports 37-48 |
WS-X6348-RJ-45 | 48-port 10/100TX RJ-45 | Ports 1-12 Ports 13-24 Ports 25-36 Ports 37-48 |
WS-X6024-10FL-MT | 24-port 10BaseFL MT-RJ | Ports 1-12 Ports 13-24 |
![]() |
Note For more information on spanning tree and setting BPDU-guard protection, see "Configuring Spanning Tree." |
![]() |
Note For more information on SPAN, see "Configuring SPAN and RSPAN." |
![]() |
Note For more information on ACLs, refer to the Catalyst 6000 Family Multilayer Switch Feature Card and Policy Feature Card Configuration Guide. |
To create a private VLAN, perform this task in privileged mode:
| Task | Command | |
|---|---|---|
Step 1 | Create the primary VLAN. | set vlan vlan_num pvlan-type primary |
Step 2 | Set the isolated or community VLAN(s). | set vlan vlan_num pvlan-type {isolated | community} |
Step 3 | Bind the isolated or community VLAN(s) to the primary VLAN. | set pvlan primary_vlan_num {isolated_vlan_num | community_vlan_num} |
Step 4 | Associate the isolated or community port(s) to the private VLAN. | set pvlan primary_vlan_num {isolated_vlan_num | community_vlan_num} mod/ports |
Step 5 | Map the isolated/community VLAN to the primary VLAN on the promiscuous port. | set pvlan mapping primary_vlan_num {isolated_vlan_num | community_vlan_num} mod/ports |
Step 6 | Verify the private VLAN configuration. | show pvlan [vlan_num] show pvlan mapping |
![]() |
Note As a shortcut, you can bind the isolated or community port(s) and associated isolated or community port(s) to the private VLAN in one step using the set pvlan primary_vlan_num {isolated_vlan_num | community_vlan_num} mod/port command. |
![]() |
Note Ports do not have to be on the same switch as long as the switches are trunk connected and the private VLAN has not been removed from the trunk. |
![]() |
Note If you are using the MSFC for your promiscuous port in your private VLAN, use 15/1 as the MSFC mod/port number if the supervisor engine is in slot 1, or use 16/1 if the supervisor engine is in slot 2. |
This example shows how to create a private VLAN using VLAN 7 as the primary VLAN, 901 as the isolated VLAN, and 902 and 903 as the community VLANs. VLAN 901 uses module 4, port 3.
VLAN 902 uses module 4, ports 4 through 6. VLAN 903 uses module 4, ports 7 through 9.
This example shows how to specify VLAN 7 as the primary VLAN:
Console> (enable) set vlan 7 pvlan-type primary Vlan 7 configuration successful Console> (enable)
This example shows how to specify VLAN 901 as the isolated VLAN and VLANs 902 and 903 as community VLANs:
Console> (enable) set vlan 901 pvlan-type isolated Vlan 901 configuration successful Console> (enable) set vlan 902 pvlan-type community Vlan 902 configuration successful Console> (enable) set vlan 903 pvlan-type community Vlan 903 configuration successful Console> (enable)
This example shows how to bind VLAN 901 to primary VLAN 7 and assign port 4/3 as the isolated port:
Console> (enable) set pvlan 7 901 4/3 Successfully set the following ports to Private Vlan 7,901: 4/3 Console> (enable)
This example shows how to bind VLAN 902 to primary VLAN 7 and assign ports 4/4 through 4/6 as the community port:
Console> (enable) set pvlan 7 902 4/4-6 Successfully set the following ports to Private Vlan 7,902:4/4-6 Console> (enable)
This example shows how to bind VLAN 903 to primary VLAN 7 and assign port 4/7 through 4/9 as the community ports:
Console> (enable) set pvlan 7 903 Successfully set association between 7 and 903. Console> (enable) set pvlan 7 903 4/7-9 Successfully set the following ports to Private Vlan 7,903:4/7-9 Console> (enable)
This example shows how to map the isolated/community VLAN to the primary VLAN on the promiscuous port, 3/1, for each isolated or community VLAN:
Console> (enable) set pvlan mapping 7 901 3/1 Successfully set mapping between 7 and 901 on 3/1 Console> (enable) set pvlan mapping 7 902 3/1 Successfully set mapping between 7 and 902 on 3/1 Console> (enable) set pvlan mapping 7 903 3/1 Successfully set mapping between 7 and 903 on 3/1
This example shows how to verify the private VLAN configuration:
Console> (enable) show vlan 7 VLAN Name Status IfIndex Mod/Ports, Vlans ---- -------------------------------- --------- ------- ------------------------ 7 VLAN0007 active 35 4/4-6 VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------ 7 enet 100010 1500 - - - - - 0 0 VLAN DynCreated RSPAN ---- ---------- -------- 7 static disabled VLAN AREHops STEHops Backup CRF 1q VLAN ---- ------- ------- ---------- ------- Primary Secondary Secondary-Type Ports ------- --------- ----------------- ----------------- 7 901 Isolated 4/3 7 902 Community 4/4-6 7 903 Community 4/7-9 Console> (enable) show vlan 902 VLAN Name Status IfIndex Mod/Ports, Vlans ---- -------------------------------- --------- ------- ------------------------ 902 VLAN0007 active 38 4/4-6 VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------ 7 enet 100010 1500 - - - - - 0 0 VLAN DynCreated RSPAN ---- ---------- -------- 7 static disabled VLAN AREHops STEHops Backup CRF 1q VLAN ---- ------- ------- ---------- ------- Primary Secondary Secondary-Type Ports ------- --------- ----------------- ----------------- 7 902 Isolated 4/4-6 Console> (enable) show pvlan Primary Secondary Secondary-Type Ports ------- --------- -------------- ------------ 7 901 isolated 4/3 7 902 community 4/4-6 7 903 community 4/7-9 Console> (enable) show pvlan mapping Port Primary Secondary ----- -------- ---------- 3/1 7 901-903 Console> (enable) show port Port Name Status Vlan Duplex Speed Type ----- ------------------ ---------- ---------- ------ ----- ------------ ...truncated output... 4/3 notconnect 7,901 half 100 100BaseFX MM 4/4 notconnect 7,902 half 100 100BaseFX MM 4/5 notconnect 7,902 half 100 100BaseFX MM 4/6 notconnect 7,902 half 100 100BaseFX MM 4/7 notconnect 7,903 half 100 100BaseFX MM 4/8 notconnect 7,903 half 100 100BaseFX MM 4/9 notconnect 7,903 half 100 100BaseFX MM ... truncated output...
You can delete a private VLAN by deleting the primary VLAN. If you delete a primary VLAN, all bindings to the primary VLAN are broken, all ports in the private VLAN become inactive, and any related mappings on the promiscuous port(s) are deleted.
To delete a private VLAN, perform this task in privileged mode:
Task | Command |
|---|---|
|
|
This example shows how to delete primary VLAN 7:
Console> (enable)clear vlan 7This command will de-activate all ports on vlan 7Do you want to continue(y/n) [n]?yVlan 7 deletedConsole> (enable)
If you delete an isolated or community VLAN, the binding with the primary VLAN is broken, any isolated or community ports associated to the VLAN become inactive, and any related mappings on the promiscuous port(s) are deleted.
To delete a VLAN on the switch, perform this task in privileged mode:
Task | Command |
|---|---|
|
|
This example shows how to delete the community VLAN 902:
Console> (enable)clear vlan 902This command will de-activate all ports on vlan 902Do you want to continue(y/n) [n]?yVlan 902 deletedConsole> (enable)
If you delete the private VLAN mapping, the connectivity breaks between the isolated or community ports and the promiscuous port. If you delete all the mappings on a promiscuous port, the promiscuous port becomes inactive. When a private VLAN port is set to inactive, it displays "pvlan-" as its VLAN number in the show port output.
A private VLAN port might be set to inactive for the following reasons:
To delete a port mapping from a private VLAN, perform this task in privileged mode:
Task | Command |
|---|---|
|
|
This example shows how to delete the mapping of VLAN 902 to 901, previously set on ports 3/2 through 3/5:
Console> (enable) clear pvlan mapping 901 902 3/2-5 Successfully cleared mapping between 901 and 902 on 3/2-5
Console> (enable)
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Mon Aug 28 10:28:40 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.